Skip to the content.

Logo

The techniques chosen for the analysis are described below. They are classified into the different security and privacy tests performed:

(Back Testing)

Logo

In summary, four frequently used techniques are remarked. “Phishing for information: spearphishing service”, “Data from local system” and “Data from cloud storage object” show good visibility coverage but poor detection coverage. The remaining one, “External remote services”, shows both poor visibility and detection coverage.

(Back Testing)